Allon Adir, Ehud Aharoni, Nir Drucker, Ronen Levy, Hayim Shaul, Omri Soceanu. — Springer, 2024. — 325 р. — ISBN 978-3-031-65494-7. This book provides basic knowledge required by an application developer to understand and use the Fully Homomorphic Encryption (FHE) technology for privacy preserving Data-Science applications. The authors present various techniques to leverage the...
No Starch Press, Inc., 2021. — 160 p. — ISBN-13: 978-1-7185-0141-6 (ebook). Rigorous in its definitions yet easy to read, Crypto Dictionary covers the field of cryptography in an approachable, and sometimes humorous way. Expand your mind and your crypto knowledge with the ultimate desktop dictionary for all things cryptography. Written by a renowned cryptographer for experts...
2nd Edition. — No Starch Press, 2024. — 360 p. — ISBN: 978-1-71850-384-7. Crypto can be cryptic. Serious Cryptography, 2nd Edition arms you with the tools you need to pave the way to understanding modern crypto. This thoroughly revised and updated edition of the bestselling introduction to modern cryptography breaks down fundamental mathematical concepts without shying away...
No Starch Press, 2018. — 312 p. — ISBN: 978-1-59327-826-7. Целевая аудитория: опытные разработчики. Данное практическое руководство познакомит вас с современными и актуальными методами шифрования информации. Являясь хорошим пособием по математическим концепциям и алгоритмам шифрования, руководство также касается таких приёмов и методов как хэш-функции, блочное шифрование,...
No Starch Press, 2020. — 312 p. — ISBN: 978-1-59327-826-7. With some corrections, 2-Jan-2020 This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and...
John Wiley & Sons, Inc., 2020. — 304 p. — ISBN: 978-1-119-61222-3 (ebk). Learn to deploy proven cryptographic tools in your applications and services Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cryptography works to protect users,...
Springer, 2021. — 294 p. — ISBN 978-3-030-73492-3 (eBook). Cryptography, as done in this century, is heavily mathematical. But it also has roots in what is computationally feasible. This unique textbook text balances the theorems of mathematics against the feasibility of computation. Cryptography is something one actually “does”, not a mathematical game one proves theorems...
IGI Global, 2020. — 380 p. — ISBN: 978-1799822554 (eISBN). The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a...
Mercury Learning and InforMation LLC., 2020. — 350 p. — ISBN: 978-1683925316. Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the...
Apress Media LLC., 2020. — 297 p. — ISBN13: (electronic): 978-1-4842-6056-2. Cryptography and encryption aren’t just for geeks and spies―they’re also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover...
Wiley Publishing, Inc., 2011. — 725 p. — ISBN: 978-1-118-03875-8 (ebk). Hands-on, practical guide to implementing SSL and TLS protocols forInternet security If you are a network professional who knows C programming, thispractical book is for you. Focused on how to implement SecureSocket Layer (SSL) and Transport Layer Security (TLS), this bookguides you through all necessary...
Rheinwerk Computing, 2024. — 325 p. — ISBN 978-1-4932-2566-8. Security professionals, you know encryption is essential to protect your data. In this book, learn about the fundamental concepts of cryptography—and then apply them! Explore algorithms for symmetric and asymmetric cryptography and see how to use encryption strategies to enforce storage and network security. Put...
2nd Edition. — Springer, 2020. — 278 p. — ISBN 978-1-0716-0987-3 (eBook). This book discusses the current research concerning public key cryptosystems. It begins with an introduction to the basic concepts of multivariate cryptography and the history of this field. The authors provide a detailed description and security analysis of the most important multivariate public key...
Apress Media LLC, 2024. — 224 p. — ISBN-13 979-8-8688-0125-9. Проектирование в соответствии со стандартом FIPS-140: Руководство для инженеров и программистов This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros and cons, and shows how to design to comply with the specifications (FIPS-140,...
CRC Press, 2025. — 292 p. — ISBN: 978-1003508632. This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data. It also covers the mathematics behind the use of algorithms for encryption and decryption. Features Presents clear insight to the readers about the various security...
Oxford University Press, 2012. — 560 p. — ISBN13: 978-0199695591. Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area...
2nd Edition. — Apress Media LLC, 2023. — 513 p. — ISBN-13: 978-1-4842-9450-5. Develop strong skills for writing cryptographic algorithms and security schemes/modules using C++23 and its new features. This book will teach you the right methods for writing advanced cryptographic algorithms, such as elliptic curve cryptography algorithms, lattice-based cryptography, searchable...
2nd Edition. — Mercury Learning and Information, September 27, 2022. — 610 p. — ISBN-13: 978-1-68392-883-6. This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and...
Springer, 2020. — 336 p. — ISBN: 978-3-030-34142-8 (eBook). Modern cryptosystems, used in numerous applications that require secrecy or privacy — electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. — are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it...
Wiley-ISTE, 2025. — 352 p. — (ISTE Invoiced). — ISBN-13: 978-1-78945-215-0. Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since its inception in the mid-90s and...
Apress Media LLC., 2024. — 274 p. — ISBN-13: 979-8-8688-0503-5. Gain the necessary technical skills, tools, and insights to succeed in the crypto working environment. Changing market conditions have created new opportunities and working conditions. This book goes beyond just getting a job, as it shares a myriad of hidden tips on how to thrive within this constantly evolving...
Manning Publications, 2022. — 225 p. — ISBN: 978-1633439795. Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods. In Secret Key Cryptography: Ciphers, from simple...
Bloomsbury Publishing, 2020. — 128 p. — ISBN: 978-1681195148. Codes can carry big secrets! Throughout history, lots of good guys and lots of bad guys have used codes to keep their messages under wraps. This fun and flippable nonfiction features stories of hidden treasures, war-time maneuverings, and contemporary hacking as well as explaining the mechanics behind the codes in...
Delacorte Press, 2002. — 263 p. — ISBN10: 0385729138. — ISBN13: 978-0385729130. amazon.com Review Calling upon accounts of political intrigue and tales of life and death, author Simon Singh tells history's most fascinating story of deception and cunning: the science of cryptography--the encoding and decoding of private information. Based on __, this version has been abridged...
3rd Edition. — Pearson Education, 2020. — 977 p. — ISBN13: 978-0-13-485906-4. A broad spectrum of cryptography topics, covered from a mathematical point of view Extensively revised and updated, the 3rd Edition of Introduction to Cryptography with Coding Theory mixes applied and theoretical aspects to build a solid foundation in cryptography and security. The authors’ lively,...
Manning Publications, 2020. — 239 p. If you’re browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you’re relying on cryptography. And you’re probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It’s important to understand...
Manning Publications, 2021. — 400 p. — ISBN 9781617296710. If you’re browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you’re relying on cryptography. And you’re probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It’s...
Manning Publications, 2020. — 350 p. — ISBN 1617296716, 9781617296710. Real-World Cryptography teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications. You’ll go hands-on with cryptography building blocks such as hash functions and key exchanges, then learn how to use them as part of your security protocols...
John Wiley/Higher Education Press, 2013. — 433 p. — (The Wiley-HEP Information Security Series). — ISBN: 978-1-118-18858-3. The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this...
М.: Манн, Иванов и Фербер, 2016. — ISBN 978-5-00100-130-0. — Изначально электронное издание. В истории любой науки (и не только науки) есть загадки, закодированные послания, скрытая от посторонних информация. В этой книге собрано множество захватывающих историй дешифровки, причем читатель с небольшой помощью автора, специалиста в области компьютерной безопасности, разгадает...
Комментарии